CVE-2026-33195

CWE-22Path Traversal8 documents7 sources
Severity
8.0HIGH
EPSS
0.0%
top 90.50%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 24

Description

Active Storage allows users to attach cloud and local files in Rails applications. Prior to versions 8.1.2.1, 8.0.4.1, and 7.2.3.1, Active Storage's `DiskService#path_for` does not validate that the resolved filesystem path remains within the storage root directory. If a blob key containing path traversal sequences (e.g. `../`) is used, it could allow reading, writing, or deleting arbitrary files on the server. Blob keys are expected to be trusted strings, but some applications could be passing

CVSS vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Affected Packages3 packages

CVEListV5rails/activestorage< 7.2.3.1+2
RubyGemsactivestorage8.1.0.beta18.1.2.1+2
NVDrubyonrails/rails8.0.08.0.4.1+2

Patches

🔴Vulnerability Details

4
OSV
CVE-2026-33195: Active Storage allows users to attach cloud and local files in Rails applications2026-03-24
GHSA
Rails Active Storage has possible Path Traversal in DiskService2026-03-23
CVEList
Rails Active Storage has possible Path Traversal in DiskService2026-03-23
OSV
Rails Active Storage has possible Path Traversal in DiskService2026-03-23

📋Vendor Advisories

2
Red Hat
Rails: Active Storage: Active Storage (Rails): Arbitrary file access via path traversal in blob keys2026-03-23
Debian
CVE-2026-33195: rails - Active Storage allows users to attach cloud and local files in Rails application...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-33195 Impact, Exploitability, and Mitigation Steps | Wiz